Lecture

Raccoon Attack on TLS 1.2

Description

This lecture delves into the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles. The instructor explains the TLS protocol, key exchange, HMAC, and the impact of the attack on TLS 1.2. The lecture covers the background of the attack, the use of shared secrets, key derivation functions, and the implications for TLS security. The instructor details how the attack works, the hidden number problem, and the lattice construction used to retrieve premaster secrets. The lecture also discusses the practicality of the attack, the differences between static and ephemeral keys, and the importance of avoiding key reuse in TLS. The instructor concludes by highlighting the lessons learned from the Raccoon Attack and the implications for TLS security.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.